Secure IoV communications for smart fleet systems empowered with ASCON. [PDF]
A J B, Kaythry P.
europepmc +1 more source
Securing of aes based on secure hash algorithm for image steganography
Kakarla Chaitanya+3 more
openalex +2 more sources
Synergized security framework: revolutionizing wireless sensor networks through comparative methodological analysis. [PDF]
Su G, Zhang B.
europepmc +1 more source
Integrity verified lightweight ciphering for secure medical image sharing between embedded SoCs. [PDF]
Janakiraman S+5 more
europepmc +1 more source
Linkable Ring Signature for Privacy Protection in Blockchain-Enabled IIoT. [PDF]
Guo F+5 more
europepmc +1 more source
Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics
Summary: This article proposes a secure communication enhancement scheme based on face detection and chaotic partition permutation. The scheme uses edge detection technology to detect facial information, which is then used as an encryption object.
Zhiyu Xie+3 more
doaj
Secure The Data In Multi Cloud Using Erasure Code And Merkle Hash Tree Algorithm
openalex +1 more source
ESHA-256_GBGO: a high-performance and optimized security framework for internet of medical thing. [PDF]
Murugan G, Chinnadurai M.
europepmc +1 more source
Research on the application of quantum-secure algorithms in 5G network
With the widespread application of 5G networks, data transmission speed and capacity have been significantly improved, promoting innovative development in fields such as the Internet of things, autonomous driving, and telemedicine.
WANG Congli+5 more
doaj
ACHealthChain blockchain framework for access control and privacy preservation in healthcare. [PDF]
Tawfik AM+3 more
europepmc +1 more source